[Full-Disclosure] Core Internet Vulnerable - News at 11:00

2004-04-20 Thread Crist J. Clark
ion possible combinations. Watson said he can guess the proper number with as few as four attempts, which can be accomplished within seconds." Hmmm... Four attempts... And the story makes it sound like a cross-platform attack, not a bug in a particular OS's ISN generation. FUD

Re: [Full-Disclosure] SMTP Encryption (S/MIME) for Outlook question

2004-03-30 Thread Crist J. Clark
you can talk or coerce into this, it could work, but if you still want to be able to send an email to [EMAIL PROTECTED], it's going to be going in clear text. [0] I suppose you could, but then you need to make the keys easily available, and if you do t

[Full-Disclosure] TiVo Network Security

2004-01-03 Thread Crist J. Clark
these answers before I bother getting a USB WiFi unit.) What protocols are used for upload and download? If they are not well known (FTP, HTTP, HTTPS, etc.) or are proprietary, anyone know how easy passive eavesdropping or active insertion or modification attacks may be? Thanks. -- Crist J. Clark

[Full-Disclosure] Re: BAD NEWS: Microsoft Security Bulletin MS03-032

2003-09-12 Thread Crist J. Clark
eassembled. > > Yes, I mean "IPS rule" - "firewall rule" is a bit inaccurate- just a > traditional term. Any IPS that does not handle fragmentation, though, has > some serious problems. s/fragmentation/fragmentation and TCP reassembly/ You&#x